欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    外文翻译--当代移动世界的新型VPN

    • 资源ID:126193       资源大小:38.40KB        全文页数:9页
    • 资源格式: DOCX        下载积分:100金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要100金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    外文翻译--当代移动世界的新型VPN

    1、附录 一、英文原文 A New Virtual Prevate Network for Todays Mobile World Karen Heyman Virtual private networks were a critical technology for turning the Internet into an important business tool. Todays VPNs establish secure connections between a remote user and a corporate or other network via the encryptio

    2、n of packets sent through the Internet, rather than an expensive private network. However, they traditionally have linked only a relatively few nodes that a companys IT department controls and congures. This is not adequate for the many organizations that now must let managers, employees, partners,

    3、suppliers, consultants, ecommerce customers, and others access networks from their own PCs, laptops, publicly available computers like those at airport kiosks, and even mobile devices, many not controlled by the organization. VPNs based on Internet Protocol security (IPsec) technology were not desig

    4、ned for and are not well-suited for such uses. Instead of restricting remote users who should not have access to many parts of a company network, explained Graham Titterington, principal analyst with market-research firm Ovum, IPsec generally connects users into a network and gives the same sort of

    5、access they would have if they were physically on the LAN. Organizations are thus increasingly adopting VPNs based on Secure Sockets Layer technology from vendors such as Aventail, Cisco Systems, F5 Networks, Juniper Networks, and Nortel Networks. SSL VPNs enable relatively easy deployment, added Ch

    6、ris Silva, an analyst at Forrester Research, a market-researchrm. A company can install the VPN at its head quarters and push any necessary software to users, who then access the network via their browsers, he explained. Organizations thus do not have to manage, update, or buy licenses for multiple

    7、clients, yielding lower costs, less maintenance and support, and greater simplicity than IPsec VPNs,Silva said. From a remote-access perspective, IPsec is turning into a legacy technology, said Rich Campagna, Juniper SSL VPN product manager Nonetheless, IPsec VPNs are still preferable for some uses,

    8、 such as linking a remote, company-controlled node, perhaps in a branch ofce, with the corporate network. Both VPN flavors are likely to continue to ourish, with the choice Published by the IEEE Computer Society An early attempt to create a VPN over the Internet used multiprotocol label switching, w

    9、hich adds labels to packets to designate their network path. In essence, all packets in a data set travel through designated tunnels to their destinations. However, MPLS VPNs dont encrypt data. IPsec and SSL VPNs, on the other hand, use encrypted packets with cryptographic keys exchanged between sen

    10、der and receiver over the public Internet. Once encrypted, the data can take any route over the Internet to reach its nal destination. There is no dedicated pathway. US Defense Department contractors began using this technique as far back as the late 1980s, according to Paul Hoffman, director of the

    11、 VPN Consortium (www.vpnc.org). Introducing IPsec Vendors initially used proprietary and other forms of encryption with their VPNs. However, to establish a standard way to create interoperable VPNs, many vendors moved to IPsec, which the Internet Engineering Task Force (IETF) adopted in 1998. With I

    12、Psec, a computer sends a request for data from a server through a gateway, acting essentially as a router, at the edge of its network. The gateway encrypts the data and sends it over the Internet. The receiving gateway queries the incoming packets, authenticates the senders identity and designated n

    13、etwork-access level, and if everything checks out, admits and decrypts the information. Both the transmitter and receiver must support IPsec and share a public encryption key for authentication. December 2007 17 Firewall Terminal services Decrypted traffic File and media server Internet SSL encrypte

    14、d Remote user: traffic Business partner Kiosk user Temporary staff Traveling staff Telecommuter Desktop SSL VPN: Authentication Authorization Decryption Integrity check Web proxy Web server E-mail server Figure 1. In an SSL VPN, a remote user logs in to a dedicated Web site to access a companys netw

    15、ork. The users browser initiates the session with a corporate server or desktop computer, which downloads the necessary software to the client. The software uses SSL for encrypting the transmitted data. At the corporate site, the VPN system authenticates users, determines what level of network acces

    16、s they should have, and if everything checks out, decrypts the data and sends it to the desired destination.Unlike SSL, IPsec is implemented as a full application installed on the client. And it doesnt take advantage of existing browser code. IPsec limitations According to Forresters Silva, corporat

    17、e IT departments increasingly need to let remote users connect to enterprise networks, which is challenging with IPsec. The normal practice of conguring IPsec VPNs to allow full access to a network can create vulnerabilities. To avoid this, administrators would have to configure them to permit acces

    18、s only to parts of a network, according to Peter Silva, technical marketing manager for F5 Networks SSL VPNs. IPsec VPNs also have trouble letting certain traffic transverse firewalls, he explained. This isnt usually a problem, as most companies have the same basic ports open both inbound and outbou

    19、nd. However, it is possible that one company would let trafc out over a port that another doesnt leave open for inbound data. By contrast, the vast majority of companies have port 80 (dedicated) Computer Open inbound and outbound, so crossing ?rewalls is rarely a problem for SSL VPNs, which are Web-

    20、based. IPsec VPNs are full programs and thus are large, generally 6 to 8 megabytes. This means they download more slowly and dont always work well on smaller devices. ENTER THE SSL VPN The first SSL VPN vendor was Neoteris, purchased in 2003 by NetScreen, which Juniper bought the next year, according to Junipers Campagna. SSL Netscape Communications developed SSL and released therst public version in 1994. The IETF adopted the technology as a standard in 1999, naming it Transport Layer Security. However, most users still call it SSL. The technology, which offers


    注意事项

    本文(外文翻译--当代移动世界的新型VPN)为本站会员(译***)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583